Skip to main content

Search

Looking for instructor-led training?

Daten im Arbeitsspeicher anzeigen

Anwendungsentwicklung

Anwendungsentwicklung verwalten

Managing application access

Application security

  • Module

    Application security

    7 Rubriques

    1h 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Attribute-based access control

  • Module

    Attribute-based access control

    5 Rubriques

    1h 5 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Benutzer zu einer Anwendung einladen

Circumstancing

  • Module

    Circumstancing

    4 Rubriques

    55 mins

    Visible to all users
  • Applications often need to customize behavior to match the needs of a specific situation or circumstance. For example, a call center may need to...

Circumstancing case processing

  • Module

    Circumstancing case processing

    7 Rubriques

    1h

    Visible to all users
  • Create variations of a rule that can be executed in specific circumstances, to better tailor application behavior to variations identified by the...

Configuring security policies

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice